Find the best remote jobs. Answer a few questions and we'll deploy a powerful assistant to help you search, create alerts, and more.
1 What roles are you open to?
2 Experience level
3 Work style
Did you know? If memory is enabled, Writing.io can remember your job search preferences and help you to improve your resume, craft customized outreach and more.
Category
Manages IT support, endpoint security, patch management, and vulnerability assessments while ensuring safe adoption of AI tools across the organization.
Manages IT security operations including endpoint management, patch/vulnerability management, access controls, and ensures safe adoption of AI tools across the organization.
Provides IT support and manages endpoint security, patch management, vulnerability scanning, and access controls while ensuring safe adoption of AI tools across the organization.
Monitors electronic and voice communications for market abuse and regulatory breaches, escalates alerts, and supports surveillance framework optimization in capital markets.
Designs and operates scalable cloud infrastructures while integrating security practices into development and operations pipelines.
Design, implement, and optimize Microsoft Defender security solutions to protect enterprise systems while leading incident response and threat mitigation efforts.
Design and operate scalable cloud infrastructures while integrating security into development and operations, automating deployments and enforcing security standards across systems.
Designs and implements enterprise cybersecurity architecture, manages security tools and engineering teams, and ensures organizational protection from internal and external threats.
Investigates security incidents, conducts root cause analysis, manages breach notifications, and develops preventive measures to protect client data and systems.
Responds to and manages security incidents, investigates threats, and implements remediation measures for the organization.
Lead IT GRC Analyst shapes and manages NBCUniversal's security governance framework, develops secure configuration baselines, and translates security principles into actionable enterprise policies.
Design and implement enterprise identity and access management (IAM) solutions including SSO, Zero Trust, and MFA to reduce cyber risk across the organization.
Designs and implements enterprise identity and access management solutions, including SSO, Zero Trust, and MFA systems to reduce cyber risk across the organization.
Investigates complex security alerts and threats 24/7, leveraging threat intelligence and AI tools to detect and respond to sophisticated adversaries across customer endpoints and cloud systems.
Investigates security alerts and threat intelligence to detect and respond to cyberattacks across customer endpoints and cloud infrastructure 24/7.
Researches and develops behavior-based detection methods for Windows identity threats like Pass-the-Hash and Silver Ticket attacks to protect enterprise endpoints.
Researches and develops behavior-based detection methods for Windows identity threats like Pass-the-Hash and Silver Ticket attacks to protect enterprise endpoints.
Intern works on hands-on cybersecurity projects including vulnerability research, penetration testing, and security tool training under expert mentorship.
Develops behavior-based detection methods and tools to identify emerging Windows identity threats like Pass-the-Hash and MFA bypass attacks.
Develops behavior-based detection methods and tools to identify emerging Windows identity threats like Pass-the-Hash and MFA bypass attacks.